Breaking and provably repairing the SSH authenticated encryption scheme
From MaRDI portal
Publication:3546458
Recommendations
- Plaintext-dependent decryption: a formal security treatment of SSH-CTR
- scientific article; zbMATH DE number 1842499
- From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS
- Analysis of the SSH key exchange protocol
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
Cited in
(18)- Plaintext-dependent decryption: a formal security treatment of SSH-CTR
- Analysis of the SSH key exchange protocol
- Authenticated encryption with small stretch (or, how to accelerate AERO)
- Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3
- Cryptanalysis of the EPBC Authenticated Encryption Mode
- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment
- scientific article; zbMATH DE number 1842499 (Why is no real title available?)
- Decrypting without keys: the case of the GlobalPlatform SCP02 protocol
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- On symmetric encryption with distinguishable decryption failures
- On the security aspects of protocol CRISP
- New proofs for NMAC and HMAC: security without collision resistance
- Jammin' on the deck
- Authenticated confidential channel establishment and the security of TLS-DHE
- The memory-tightness of authenticated encryption
- Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
- Data is a stream: security of stream-based channels
This page was built for publication: Breaking and provably repairing the SSH authenticated encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3546458)